Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP

@article{Bennett2014QuantumCI,
  title={Quantum Cryptography II: How to re-use a one-time pad safely even if P=NP},
  author={Charles H. Bennett and Gilles Brassard and Seth Breidbart},
  journal={Natural Computing},
  year={2014},
  volume={13},
  pages={453 - 458}
}
When elementary quantum systems, such as polarized photons, are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media, e.g. a communications channel on which it is impossible in principle to eavesdrop without a high probability of being detected. With such a channel, a one-time pad can safely be reused many times as long as no eavesdrop is detected, and, planning ahead, part of the capacity of… 

Two-way unclonable encryption with a vulnerable sender

The proposed Unclonable Encryption protocol with the additional property that the sender's key material is allowed to leak even in the case of an unsuccessful run makes it possible to achieve secure quantum encryption even when one of the parties is unable to protect its keys against after-protocol theft.

Quantum Authentication and Encryption with Key Recycling - Or: How to Re-use a One-Time Pad Even if P=NP - Safely & Feasibly

We propose an information-theoretically secure encryption scheme for classical messages with quantum ciphertexts that offers detection of eavesdropping attacks, and re-usability of the key in case no

Uncloneable Quantum Encryption via Random Oracles

This work formally defines uncloneable encryption, and shows how to achieve it using Wiesner's conjugate coding, combined with a quantum-secure pseudorandom function (qPRF), and shows security by adapting techniques from the quantum one-way-to-hiding lemma, as well as using bounds from quantum monogamy-of-entanglement games.

Uncloneable Quantum Encryption via Oracles

This work formally defines uncloneable encryption, and shows how to achieve it using Wiesner's conjugate coding, combined with a quantum-secure pseudorandom function (qPRF), and shows security by adapting techniques from the quantum one-way-to-hiding lemma, as well as using bounds from quantum monogamy-of-entanglement games.

Optimal attacks on qubit-based Quantum Key Recycling

From the optimal attacks determined, the required amount of privacy amplification is computed and hence the achievable communication rate (useful information per qubit) of qubit-based QKR, and 8-state encoding yields the highest communication rates.

Quantum data locking for high-rate private communication

We show that, if the accessible information is used as a security quantifier, quantum channels with a certain symmetry can convey private messages at a tremendously high rate, as high as less than

UvA-DARE (Digital Academic Repository) Quantum cryptography beyond quantum key distribution

This review article, aimed primarily at cryptographers unfamiliar with the quantum world, surveys the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.

PROOF FOR QUANTUM KEY RECYCLING WITH NOISE

The modified protocol has high rate not only for 8-state encoding, but also 6-state and BB84 encoding and a security proof based on a bound on the trace distance between the real quantum state of the system and a state in which the keys are completely secure.

Security proof for quantum key recycling with noise

A protocol modification is introduced and a security proof is provided based on a bound on the trace distance between the real quantum state of the system and a state in which the keys are completely secure, which turns out that the rate is higher than suggested by previous results.

Quantum Authentication and Encryption with Key Recycling

We propose an information-theoretically secure encryption scheme for classical messages with quantum ciphertexts that offers detection of eavesdropping attacks, and re-usability of the key in case no

References

SHOWING 1-10 OF 14 REFERENCES

Quantum Cryptography, or Unforgeable Subway Tokens

The use of quantum mechanical systems to record information gives rise to novel cryptographic phenomena, not achievable with classical recording media, including the multiplexing of two messages in such a way that either message may be recovered at the cost of irreversibly destroying the other.

A single quantum cannot be cloned

If a photon of definite polarization encounters an excited atom, there is typically some nonvanishing probability that the atom will emit a second photon by stimulated emission. Such a photon is

How to generate cryptographically strong sequences of pseudo random bits

  • M. BlumS. Micali
  • Computer Science, Mathematics
    23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
  • 1982
A more operative definition of Randomness should be pursued in the light of modern Complexity Theory.

Theory and application of trapdoor functions

  • A. Yao
  • Computer Science, Mathematics
    23rd Annual Symposium on Foundations of Computer Science (sfcs 1982)
  • 1982
A new information theory is introduced and the concept of trapdoor functions is studied and applications of such functions in cryptography, pseudorandom number generation, and abstract complexity theory are examined.

Conjugate coding

It is shown that in compensation for this "quantum noise", quantum mechanics allows us novel forms of coding without analogue in communication channels adequately described by classical physics.

Information Theory and Reliable Communication

This chapter discusses Coding for Discrete Sources, Techniques for Coding and Decoding, and Source Coding with a Fidelity Criterion.

Conjugate Coding’’, unpublished manuscript (ca

  • 1970

Conjugate Coding'', unpublished manuscript (ca. 1970). [This seminal work, actually written in 1968

  • the wake of
  • 1983

Conjugate Coding”, unpublished manuscript,12 (ca

  • 1970